Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      Need4Weed

      Worldwide IP Range Lookup and Range Finders etc

      Recommended Posts

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      This is a IP Tool kit its the central backbone of IPs on the whole internet ! You can Find any sort of company to IP to IP ranges that run certain OS for hackign and scanning i use for !

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By Adam Garber

          Hidden Content
          Give reaction to this post to see the hidden content.  
          Dear members!





          We are pleased to offer you our service for providing VDS and dedicated servers for a wide range of tasks around the world!
          Our sales and customer support specialists are ready to answer any of your questions regarding the services provided.

          Who we are: a professional team that provides VDS / VPS hosting and ar dedicated servers.
          In almost all data centers, we have our own racks in which our servers are located.
          Experience in this area for about 4 years.

          Our servers are ideally suited for any tasks requiring increased anonymity and stability. Including Pentest and any related software.
          Technical support is ON-LINE 24 hours a day (through tickets on the website) and are ready to come to your aid in resolving issues on servers, VDS / VPS within their competence.
          All prices, countries and other additional information you can get on our website in the TOR.

          To order services, use our site in the TOR (via TOR-browser):


          Hidden Content
          Give reaction to this post to see the hidden content.

          Terms of Service (TOS):

          What is strictly forbidden to be placed on our servers, regardless of their physical location:

          1. Any content whose purpose is to cause direct or indirect harm (damage) to the Russian Federation and CIS countries.
          2. Any content in one way or another related to terrorism or the financing of terrorism (extremism).
          3. Any content containing pornographic material (except in countries where this is officially permitted by local laws).
          4. Child porn is prohibited in any form and is punishable by the immediate shutdown of the server without a refund and backups.
          5. Any content related to the sale or distribution of narcotic drugs or their precursors, as well as propaganda for the distribution of these drugs.
          6. Any type of illegal activity against government / financial networks and institutions, regardless of country.
          7. Posting content for the purpose of selling or distributing weapons and explosives.
          8. The boorish attitude towards the employees of our service may lead to a denial of service.


          - The client is responsible for the content that he places on the server and for the possible consequences of its use.
          - All our servers are provided without administration. You get full access and use the server as you see fit.
          - The client himself must monitor the backups on his server (s), in the event of a hard disk failure or any other circumstances of force majeure, our service will not reimburse
          - You do not have any direct or indirect losses that could arise as a result of a hard drive failure for any of the reasons.
          - Our task is to change your HDD for a new one, and we will do this in the shortest possible time, but we won’t bear it for the lost profit due to the failure of it.
          - Payment for services is made for 1 calendar month (minimum period), we do not rent equipment weekly and do not return MoneyBack if you personally want to cancel the services ahead of schedule.
          - Payment for services is accepted exclusively in BTC.

          This agreement is a mini-offer and takes effect after you have completed the order and received the service.
          If you do not like any of our rules, just do not place an order.

          For any kind of advice regarding the purchase of services, please use our PRE-SALES contacts:

          telegram:  Hidden Content
          Give reaction to this post to see the hidden content.

          jabber (CONSULT): [email protected] OR consult[doT]exploit.im


          SUPPORT (24/7) jabber: [email protected]


          All orders and technical support are carried out exclusively through our website in the TOR:

          Hidden Content
          Give reaction to this post to see the hidden content.

          This top is for advertising purposes only, so we kindly ask you not to flood here, but to leave only feedback on the use of our services.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Summary
          This is a simple script intended to perform a full recon on an objective with multiple subdomains
          Features
              Tools checker
              Google Dorks (based on deggogle_hunter)
              Subdomain enumeration (passive, resolution, bruteforce and permutations)
              Sub TKO (subjack and nuclei)
              Web Prober (httpx)
              Web screenshot (aquatone)
              Template scanner (nuclei)
              Port Scanner (naabu)
              Url extraction (waybackurls, gau, hakrawler, github-endpoints)
              Pattern Search (gf and gf-patterns)
              Param discovery (paramspider and arjun)
              XSS (Gxss and dalfox)
              Open redirect (Openredirex)
              SSRF checks (from m4ll0k/Bug-Bounty-Toolz/SSRF.py)
              Github Check (git-hound)
              Favicon Real IP (fav-up)
              JS Checks (LinkFinder, SecretFinder, scripts from JSFScan)
              Fuzzing (ffuf)
              Cors (Corsy)
              SSL Check (testssl)
              Interlace integration
              Custom output folder (default under Recon/target.com/)
              Run standalone steps (subdomains, subtko, web, gdorks...)
              Polished installer compatible with most distros
              Verbose mode
              Update tools script


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. WP-Hide Explained
          The convenient way to hide your WordPress from being visible through the code.
          A huge improvement over Site Security since hackers web scanners will not find any WordPress trace on your site. Over 99,99% of sites hacks are focused attacks on specific plugins and themes vulnerabilities. Since no WordPress plugins and themes are found anymore, no hack occur even if site using exploitable code.
          Provide a clean method for removing any WordPress fingerprints including themes and plugins.
          No negative impact on SEO at all ! Used wisely, specific SEO aspects can be improved.
          WP HIDE PRO now available!
          The plugin not only allow to change default urls of you WordPress, but it hide/block defaults! All other similar plugins just change the slugs, but the defaults are still accessible, obviously revealing the WordPress.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. About this book
          Cybersecurity – Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining.
          Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack – the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user’s identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system.
          This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. GDBFrontend
          GDBFrontend is an easy, flexible and extension able gui debugger.
          Changelog v0.5.1 beta
          Added 32-bit and ARM Gotty executables.
          Added dark theme.
          Clear prev symbols while connecting gdbserver.
          Made it possible to stop execution while remote target running.
          Check if GDB is installed before run.
          Fix inner LinkedListVisualizer close event bubbles.
          Redirect /terminal to /terminal/.
          Send SIGKILL to process group.
          Various enhancements.

          Hidden Content
          Give reaction to this post to see the hidden content.